Complete Security Delivering strength through trust Robust enterprise security framework to reduce risk, compliant with modern best-practices, and operating at global scale Coverage of all aspects of information security management, including
Webinar: The Next Black Box: ChatGPT, LLMs, and Legal Technology Generative AI applications like ChatGPT are suddenly everywhere, with companies announcing new integrations daily – including in the legal industry. But what is
Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create
Webinar: No Maps for These Territories: The Uncertain Legal Future of Crypto The past year has been one of dramatic upheavals in countless areas, perhaps none more so than cryptocurrency and decentralized
Teach an Attorney to Phish: Lawyers' Duties in a Digital World The cyber landscape has never felt more like a wild frontier. Phishing attacks continue to rise, as do ransomware attacks and
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.
With source types multiplying – including challenging sources like smartphones, social media, and collaboration tools, it is more important than ever for legal practitioners of all types to familiarize themselves with the fundamentals of collection so that they can assist in spotting potential issues and identifying appropriate solutions.
In discovery specifically, and in legal practice generally, the role of electronically-stored information (ESI) and new technology has grown exponentially over the past decade, as new sources have proliferated, new tools have become normalized, and new communication channels have supplanted the old.
Cyber Incident Response Control risks by promptly identifying and notifying individuals affected by a cyber incident Streamline incident investigation and notification processes with trusted expertise Solutions delivered for a fixed cost
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part Two of Two)
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part Two of Two) For a vendor relationship to be long-lasting and effective, both sides should be able to identify when
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part One of Two)
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part One of Two) Once the critical process of vetting and selecting vendors is complete, the third-party oversight work begins. Change
The Journey of Law Firm Security Assessments, From Genesis to Review Legal ops professionals from Disney and Walgreens captured the changing law firm cybersecurity paradigm and some of the bumps they encountered in
Börsen-Zeitung (June 8, 2018): Data Transfer Trouble (Translation from the German original „Daumenschrauben beim Datentransfer“) New EU regulation makes data exchange with countries more difficult – Threat of more legal disputes Author: Heidi Rohde.
Interview: Ben Rusch of Consilio on the practical problems of collecting data in the EU Ben Rusch, interviewed by Chris Dale for the eDisclosure Information Project, is
Webinar: Cybersecurity Impacts on the Legal Industry
Whitepaper: Rise of Law Firm Hacks Leads to More Scrutiny From Corporate Clients Third-Party Cybersecurity Assessments Help Manage Risk Karen Hornbeck, Consilio Last year was a lightning rod for law firm
Four Technologies Help Limit and Manage PII in Cross-Border eDiscovery With the General Data Protection Regulation (GDPR) yet to go into effect and evolving data privacy laws, organizations face a huge challenge when it
Are You Ready for the New China Cybersecurity Law? Managing Director, Dan Whitaker discusses China's comprehensive Cybersecurity Law and the implications it will have on businesses when it goes into effect in June
Eye on Discovery -Can You Trust Your Law Firms With Your Data? Your data is only as safe as the data of your least secure link to it. Unfortunately, for many organizations, suppliers that